Cisco Unified Wireless Network Architecture—Base Security Features [PDF]

Figure 4-1 illustrates a secure wireless topology. ... Using the IPSK feature, you can easily and securely connect indiv

3 downloads 9 Views 4MB Size

Recommend Stories


Cisco Unified Wireless IP Phone 792xG + Cisco Meraki Wireless
Open your mouth only if what you are going to say is more beautiful than the silience. BUDDHA

Wireless Network Security
And you? When will you begin that long journey into yourself? Rumi

Cisco Unified Wireless IP Phone 7921G
You miss 100% of the shots you don’t take. Wayne Gretzky

Cisco RV220W Network Security Firewall
You have survived, EVERY SINGLE bad day so far. Anonymous

Cisco SAFE: Wireless LAN Security in Depth
When you do things from your soul, you feel a river moving in you, a joy. Rumi

Cisco Unified Wireless-IP-Telefon 7921G für Cisco Unified Communications Manager 7.0
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

Implementing Cisco Network Security - Exam 210-260
If you want to become full, let yourself be empty. Lao Tzu

Cisco Unified CME Commands
Happiness doesn't result from what we get, but from what we give. Ben Carson

Cisco Unified Communications Manager
And you? When will you begin that long journey into yourself? Rumi

Cisco Unified Communications Manager
Make yourself a priority once in a while. It's not selfish. It's necessary. Anonymous

Idea Transcript


CHAPTER

4

Cisco Unified Wireless Network Architecture—Base Security Features The Cisco Unified Wireless Network solution provides end-to-end security of architecture and product security features to protect wireless local area network (WLAN) endpoints, the WLAN infrastructure, and client communications. The Cisco Unified Wireless Network solution builds upon the base security features of the IEEE 802.11-2012 standard by enhancing radio frequency (RF) and network-based security features to ensure overall security.

Secure Wireless Topology Figure 4-1 illustrates a secure wireless topology. The topology is made up of the following components with their basic roles in the 802.1X authentication process. •

WLAN client with 802.1X supplicant (wireless software) on the client.



Access point (AP) and Wireless LAN Controller (WLC) using the control and provisioning of wireless access points (CAPWAP) protocol.



RADIUS protocol carrying extensible authentication protocol (EAP) packets between the client and the authentication server.



Authentication, Authorization, and Accounting (AAA) server as the Authentication Server.

Enterprise Mobility 8.5 Design Guide

4-1

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WLAN Security Mechanisms

Figure 4-1

Secure Wireless Topology

WLAN Security Mechanisms Security is implemented using authentication and encryption in the WLAN network. The security mechanisms for WLAN networks are: •

Open Authentication (no encryption)



Cisco WEP Extensions (Cisco Key Integrity Protocol + Cisco Message Integrity Check)



Wi-Fi Protected Access (WPA)



Wi-Fi Protected Access 2 (WPA2)



Identity PSK (WPA2 PSK + Mac-Filtering)



Cisco Adaptive Wireless Intrusion Prevention System (wIPS) with Enhanced Local Mode (ELM)

Wi-Fi Protected Access (WPA) The 802.11 WEP standard failed to address the issue of how to manage encryption keys. The encryption mechanism itself was found to be flawed, in that a WEP key could be derived simply by monitoring client traffic. The IEEE 802.11i standard addresses these security issues found in the original 802.11 WEP standard. WPA and WPA2 are 802.11i-based security solutions as defined by the Wi-Fi Alliance. The Wi-Fi Alliance certifies inter-operability of IEEE 802.11 products and promotes wireless LAN standards across all market segments. The Wi-Fi Alliance's test suite defines how products are tested to obtain interoperability certification with other Wi-Fi Certified products. WPA uses Temporal Key Integrity Protocol (TKIP) for encryption and dynamic encryption key generation with either a pre-shared key or a RADIUS/802.1x-based authentication. The mechanisms introduced in WPA are designed to provide more robust security to WEP solutions without requiring a hardware upgrade.

Enterprise Mobility 8.5 Design Guide

4-2

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features 802.1X

Wi-Fi Protected Access 2 (WPA2) WPA2 is the next generation of Wi-Fi security based on the ratified IEEE 802.11i standard and is also approved by the Wi-Fi Alliance interoperability implementation of the 802.11i standard. WPA2 provides certification in both Enterprise and Personal classifications. The Enterprise classification requires support for a RADIUS/802.1x-based authentication and pre-shared key; Personal classification requires only a common key shared by the client and the AP. The newer Advanced Encryption Standard (AES) mechanism introduced in WPA2 generally requires a hardware upgrade of WLAN clients and APs; however, all Cisco CAPWAP hardware is WPA2 enabled.

802.1X 802.1X is an IEEE framework for port-based access control as adopted by the 802.11i security workgroup. The framework provides authenticated access to WLAN networks. •

The 802.11 association process creates a "virtual" port for each WLAN client at the AP.



The AP blocks all data frames apart from 802.1X-based traffic.



The 802.1X frames carry the EAP authentication packets, which are passed through to the AAA server by the AP.



If the EAP authentication is successful, the AAA server sends an EAP success message to the AP, where the AP then allows data traffic from the WLAN client to pass through the virtual port.



Before opening the virtual port, data link encryption is established between the WLAN client and the AP. This is to ensure no other WLAN client can access the port established for authenticating clients.

Identity PSK The Identity PSK (IPSK) feature supports the growing number of devices that are getting connected to the Internet and do not support the 802.1x security protocol. These devices can connect to the network using the WSA-PSK protocol. Using the IPSK feature, you can easily and securely connect individual device or group of devices on the network with unique pre-shared keys.

Authentication and Encryption The Cisco Wireless Security suite provides options for security approaches based on required or pre-existing authentication, privacy, and client infrastructure. The Cisco Wireless Security suite supports WPA, WPA2, WEP Extension, and wIPS with the ELM feature. The following options are available: •

Authentication based on 802.1X using the following EAP methods: – Cisco LEAP, EAP-Flexible Authentication via Secure Tunneling (EAP-FAST) – PEAP- Generic Token Card (PEAP-GTC) – PEAP-Microsoft Challenge Authentication Protocol Version 2 (PEAP-MSCHAPv2) – EAP-Transport Layer Security (EAP-TLS) – EAP-Subscriber Identity Module (EAP-SIM)

Enterprise Mobility 8.5 Design Guide

4-3

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

802.1X



Encryption: – AES-CCMP encryption (WPA2) – TKIP encryption enhancements: key hashing (per-packet keying), message integrity check

(MIC) and broadcast key rotation via WPA/WPA2 or WEP TKIP Cisco Key Integrity Protocol (CKIP)

Identity PSK for non-802.1X authentication Identity PSK combines the ease of WPA-PSK with RADIUS integration. It is an ideal alternative for many devices that do not support 802.1X supplicant. It is also a simpler method to enabling unique pre-shared keys for different clients within the same WLAN. The flexibility also enhance policies distribution with the added capability of AAA override. •

WPA-PSK and Mac-Filtering: RADIUS authorizing client mac and send passphrase as part of VSA to WLC.

Extensible Authentication Protocol Extensible Authentication Protocol (EAP) is an IETF RFC, stipulates that an authentication protocol must be de-coupled from the transport protocol. This allows the EAP protocol to be carried by transport protocols such as 802.1X, UDP, or RADIUS without making changes to the authentication protocol itself. The basic EAP protocol contains the following four packet types:

Enterprise Mobility 8.5 Design Guide

4-4

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features 802.1X



EAP request—The request packet is sent by the authenticator to the supplicant. Each request has a type field that indicates what is being requested; for example, supplicant identity and EAP type to be used. A sequence number allows the authenticator and the peer to match an EAP response to each EAP request.



EAP response—The response packet is sent by the supplicant to the authenticator, and uses a sequence number to match the initiating EAP request. The type of the EAP response generally matches the EAP request, except if the response is a negative-acknowledgment (NAK).



EAP success—The success packet is sent, from the authenticator to the supplicant, when successful authentication occurs.



EAP failure—The failure packet is sent, from the authenticator to the supplicant, when unsuccessful authentication occurs.

When using EAP in an 802.11i compliant system, the AP operates in EAP pass-through mode. Pass-through mode checks the code identifier and the length fields, and then forwards EAP packets received from the client supplicant to the AAA. EAP packets received by the authenticator from the AAA server are forwarded to the supplicant. Figure 4-2 is an example of an EAP protocol flow. Figure 4-2

EAP Protocol Flow

Authentication Depending on your requirements, various authentication protocols such as PEAP, EAP-TLS, and EAP-FAST are used in secure wireless deployments. Regardless of the protocol, they all use 802.1X, EAP, and RADIUS as their underlying transport.

Enterprise Mobility 8.5 Design Guide

4-5

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

802.1X

These protocols allow network access control based on the successful authentication of the WLAN client and vice-versa. This solution also provides authorization through policies communicated through the RADIUS protocol, as well as RADIUS accounting. EAP types used for performing authentication are described in more detail below. The primary factor affecting the choice of EAP protocol is the authentication system (AAA) currently used. Ideally, a secure WLAN deployment should not require the introduction of a new authentication system, but rather should leverage the authentication systems that are already in place.

Supplicants The various EAP supplicants that are available in the marketplace reflect the diversity of authentication solutions available and customer preferences. Table 4-1 shows a summary of common EAP supplicants: •

EAP-FAST—EAP-Flexible Authentication via Secured Tunnel. Uses a tunnel similar to that used in PEAP, but does not require the use of Public Key Infrastructure (PKI).



PEAP MSCHAPv2—Protected EAP MSCHAPv2. Uses a Transport Layer Security (TLS) tunnel, (the IETF standard of SSL) to protect an encapsulated MSCHAPv2 exchange between the WLAN client and the authentication server.



PEAP GTC—Protected EAP Generic Token Card (GTC). Uses a TLS tunnel to protect a generic token card exchange; for example, a one-time password or LDAP authentication.



EAP-TLS—EAP Transport Layer Security. Uses PKI to authenticate both the WLAN network and the WLAN client, requiring both a client certificate and an authentication server certificate.

Table 4-1

Comparison of Common Supplicants

Cisco EAP-FAST

PEAP MS-CHAPv PEAP 2 EAP-GTC

EAP-TLS

Single sign-on (MSFT AD only)

Yes

Yes

Yes

Yes

Login scripts (MSFT AD only)

Yes

Yes

Some

Yes2

Password change (MSFT AD)

Yes

Yes

Yes

N/A

Microsoft AD database support

Yes

Yes

Yes

Yes

ACS local database support

Yes

LDAP database support

Yes

Yes

Yes

3

No

Yes

Yes

4

Yes

OTP authentication support

Yes

No

Yes

No

RADIUS server certificate required?

No

Yes

Yes

Yes

Client certificate required?

No

No

No

Yes

Anonymity

Yes

5

Yes

1. Supplicant dependent 2. Machine account and machine authentication is required to support the scripts. 3. Automatic provisioning is not supported on with LDAP databases. 4. Supplicant dependent 5. Supplicant dependent 6. Supplicant dependent

Enterprise Mobility 8.5 Design Guide

4-6

1

6

Yes

No

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features 802.1X

Authenticator The WLC is the authenticator acting as a relay for EAP messages exchanged between the 802.1X-based supplicant and the RADIUS authentication server. Once authentication is completed successfully, the WLC receives the following: •

A RADIUS packet containing the EAP success message.



An encryption key, which is generated at the authentication server during the EAP authentication.



RADIUS vendor-specific attributes (VSAs) for communicating policy.

Figure 4-3 displays the logical location of the authenticator within the overall authentication architecture. The authenticator controls network access using the 802.1X protocol, and relays EAP messages between the supplicant and the authentication server. Figure 4-3

Authenticator Location

The EAP exchange sequence is as follows: •

Packet no.1 is sent by the AP to the client, requesting the client identity; this begins the EAP exchange.



Packet no.2 contains the client identity, which is forwarded to the RADIUS server. Based on the client identity, in packet 2, the RADIUS server will determine to continue the EAP authentication or not.



Packet no.3 contains a RADIUS server request to use PEAP as the EAP method for authentication. The actual request depends on the EAP types configured on the RADIUS server. If the client rejects the PEAP request, the RADIUS server can offer other EAP types.



Packets no.4 through 8 are the TLS tunnel setup for PEAP.



Packets no.9 through 16 are the authentication exchange within PEAP.

Enterprise Mobility 8.5 Design Guide

4-7

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

802.1X



Packet no.17 is the EAP message informing the supplicant and the authenticator that the authentication was successful; in addition, Packet no.17 carries encryption keys and authorization information, in the form of RADIUS VSAs, to the authenticator.

Authenticator with Identity PSK •

When the client sends association request to the SSID broadcasted by the access point, the Wireless LAN Controller forms the RADIUS request packet with the particular macaddress of the client and relays to the RADIUS server.



The RADIUS server performs the authentication (checks whether the client is allowed or not) and sends either ACCESS-ACCEPT or ACCESS-REJECT as response to the WLC.



To support dynamic PSK, in addition to sending the authentication response, the authentication server would also provide the passphrase for this specific client. This is used further for the computation of PSK.



The RADIUS server could also provide additional parameters such as username, VLAN, QoS etc in the response, that is specific to this client. For multiple devices that is owned by a single user, the passphrase could remain the same.



Upon reception of passphrase/computation of PSK, the WLC would generate PTK using 4-way handshake process as depicted in the below diagram (figure 4-x)

Authentication Server The authentication server used in the Cisco Secure Unified Wireless Network solution is the Cisco Access Control Server (ACS) and the Cisco Identity Services Engine (ISE). ACS is available as software that is installed on a Windows servers, or as an appliance. ISE is available as software that is installed on the VM server. Alternatively, the authentication server role can be implemented within specific WLAN infrastructure devices such as local authentication services on an IOS AP, local EAP authentication support within the WLC, AAA services integrated in any AAA server that supports the required EAP types.

Enterprise Mobility 8.5 Design Guide

4-8

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Encryption

Figure 4-4 shows the logical location of the authentication server within the overall wireless authentication architecture, where it performs the EAP authentication via a RADIUS tunnel.

Figure 4-4

Authentication Server Location

After the completion of a successful EAP authentication, the authentication server sends an EAP success message to the authenticator. This message tells the authenticator that the EAP authentication process was successful, and passes the pair-wise master key (PMK) to the authenticator that is in turn used as the basis for creating the encrypted stream between the WLAN client and the AP.

Encryption Encryption is a necessary component of WLAN security to provide privacy over a local RF broadcast network. Any new deployment should be using either TKIP (WPA/WPA2) or AES encryption. In WPA and WPA2, the encryption keys are derived during the four-way handshake discussed later in this section.

TKIP Encryption Enterprise-level encryption mechanisms specified by 802.11i are certified as WPA/WPA2 and wIPS by the Wi-Fi Alliance: Temporal Key Integrity Protocol (TKIP), and Advanced Encryption Standard (AES). TKIP is the certified encryption method. It provides support for legacy WLAN equipment by addressing the original flaws associated with the 802.11 WEP encryption method. It does this by making use of the original RC4 core encryption algorithm. The hardware refresh cycle of WLAN client devices is such that TKIP and AES is likely to be a common encryption option for a number of years to come. The AES encryption is the preferred method because it brings the WLAN encryption standards into alignment with broader IT industry standards and best

Enterprise Mobility 8.5 Design Guide

4-9

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Encryption

practices. Figure 4-5 displays a basic TKIP flow chart. Figure 4-5

TKIP Flow Chart

The two primary functions of TKIP are the generation of a per-packet key using RC4 encryption of the MAC service data unit (MSDU) and a message integrity check (MIC) in the encrypted packet. The per-packet key is a hash of the transmission address, the frame initialization vector (IV), and the encryption key. The IV changes with each frame transmission, so the key used for RC4 encryption is unique for each frame. The MIC is generated using the Michael algorithm to combine a MIC key with user data. The use of the Michael algorithm is a trade-off because its low computational overhead is good for performance, but it can be susceptible to an active attack. To address this, WPA includes countermeasures to safeguard against these attacks that involve temporarily disconnecting the WLAN client and not allowing a new key negotiation for 60 seconds. Unfortunately, this behavior can itself become a type of DoS attack. Many WLAN implementations provide an option to disable this countermeasure feature.

Removal of TKIP from Wi-Fi® Devices As per the Wi-Fi alliance and 802.11 WPA, wireless networks that use Temporal Key Integrity Protocol (TKIP), no longer provide sufficient security to protect consumer or enterprise Wi-Fi® networks. TKIP is an older security technology with known vulnerabilities to some cryptographic attacks.Wi-Fi® networks. TKIP is an older security technology with known vulnerabilities to some cryptographic attacks. TKIP and WEP use the same underlying cipher, and, consequently, they are vulnerable to a number of similar attacks. TKIP was designed as a transitional mechanism in 2004 for devices equipped with WEP and unable to support AES. Due to the known vulnerabilities of TKIP, networks utilizing it may be more susceptible to attack.

Enterprise Mobility 8.5 Design Guide

4-10

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Encryption

Recommendations: •

Network administrators should purchase or deploy equipment that supports WPA2.



Network administrators should configure their APs to be WPA2 only.



Equipment vendors should proactively transition away from TKIP support by discouraging its use to their customer base, and removing the functionality in product as internal research indicates when their market no longer needs it.

For equipment vendors, Wi-Fi Alliance recommends that they discourage the use of TKIP in the short term, and ultimately remove TKIP from all Wi-Fi devices when their market no longer needs it. At a minimum, vendors should remove TKIP and any "TKIP-only" mode configurations from the primary device interface. Access to the "TKIP-only" configuration mode via a secondary configuration interface is acceptable. The requirement to go to a secondary interface is a mechanism used to restrict TKIP usage to only those deployments with legacy devices; other deployments will typically use the primary configuration interface. Transitional Exception:

Vendors should remove TKIP and any "TKIP-only" mode configurations from the primary device interface. Access to the "TKIP-only" configuration mode via a secondary configuration interface is acceptable (CLI). For more information, see Technical Note - Removal of TKIP from Wi-Fi Devices. We developed a set of commands to configure TKIP from CLI mode only as was recommended by the Wi-Fi alliance: (Cisco Controller) >config wlan security wpa wpa1 ciphers tkip (Cisco Controller) >test wlan standalone-tkip >

If the same configuration is attempted from the GUI interface the following will be displayed on the screen:

AES Encryption Figure 4-6 displays the basic AES counter mode/CBC MAC Protocol (CCMP) flow chart. CCMP is one of the AES encryption modes, where the counter mode provides confidentiality and CBC MAC provides message integrity.

Enterprise Mobility 8.5 Design Guide

4-11

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Encryption

Figure 4-6

WPA2 AES CCMP

In the CCMP procedure, additional authentication data (AAD) is taken from the MAC header and included in the CCM encryption process. This protects the frame against alteration of the non-encrypted portions of the frame. To protect against replay attacks, a sequenced packet number (PN) is included in the CCMP header. The PN and portions of the MAC header are used to generate a nonce that is in turn used by the CCM encryption process.

Four-Way Handshake The four-way handshake is the method used to derive the encryption keys to encrypt wireless data frames. Figure 4-7 graphically represents the frame exchanges used to generate the encryption keys. These keys are referred to as temporal keys. The encryption keys are derived from the PMK that is mutually derived during the EAP authentication. This PMK is sent to the authenticator in the EAP success message, but is not forwarded to the supplicant because the supplicant has derived its own copy of the PMK. 1.

The authenticator sends an EAPOL-Key frame containing an authenticator nonce (ANonce), which is a random number generated by the authenticator.

Enterprise Mobility 8.5 Design Guide

4-12

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Proactive Key Caching (PKC) and CCKM

The supplicant derives a PTK from the ANonce and supplicant nonce (SNonce), which is a random number generated by the client/supplicant. 2.

The supplicant sends an EAPOL-Key frame containing an SNonce, the RSN information element from the (re)association request frame, and an MIC. The authenticator derives a PTK from the ANonce and SNonce and validates the MIC in the EAPOL-Key frame.

3.

The authenticator sends an EAPOL-Key frame containing the ANonce, the RSN information element from its beacon or probe response messages; the MIC, determining whether to install the temporal keys; and the encapsulated group temporal key (GTK), the multicast encryption key.

4.

The supplicant sends an EAPOL-Key frame to confirm that the temporal keys are installed.

Figure 4-7

Four-Way Handshake

Proactive Key Caching (PKC) and CCKM Proactive Key Caching (PKC) is an 802.11i extension that allows for the proactive caching (before the client roaming event) of the PMK that is derived during a client 802.1x/EAP authentication at the AP (see Figure 4-8). If a PMK (for a given WLAN client) is pre-cached at an AP, to which the client is about to roam, full 802.1x/EAP authentication is not required. Instead, the WLAN client can simply use the WPA four-way handshake process to securely derive a new session encryption key for communication with that AP.

Enterprise Mobility 8.5 Design Guide

4-13

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Proactive Key Caching (PKC) and CCKM

The distribution of these cached PMKs to APs is greatly simplified in the Cisco Unified Wireless Network deployment. The PMK is simply cached in the controller(s) and made available to all APs that connect to it. The PMK is also shared with all other controllers that make up a mobility group with the anchor controller. Figure 4-8

Proactive Key Caching Architecture

Cisco Centralized Key Management (CCKM) is a Cisco standard supported by Cisco Compatible Extensions clients to provide fast secure roaming (FSR). The principle mechanism for accelerating the roaming process is the same as PKC, which is to use a cached PMK. However, the implementation in CCKM is slightly different, which makes the two mechanisms incompatible with each other. The state of the key cache for each WLAN client can be seen with the show pmk-cache all command. This identifies which clients are caching the keys, and which key caching mechanism is being used. The 802.11r workgroup is responsible for the standardization of an FSR mechanism for 802.11. The WLC supports both CCKM and PKC on the same WLAN -802.1x+CCKM, as shown in the following example:

Enterprise Mobility 8.5 Design Guide

4-14

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco Unified Wireless Network Architecture

Cisco Unified Wireless Network Architecture Figure 4-9 shows a high level topology of the Cisco Unified Wireless Network architecture that includes the CAPWAP APs, the mesh CAPWAPs, the management system (WCS/NCS/PI), and the wireless LAN controller (WLC). The Cisco Access Control Server (ACS) or the Identity Services Engine (ISE) and their AAA features complete the solution by providing RADIUS services in support of wireless user authentication and authorization.

Enterprise Mobility 8.5 Design Guide

4-15

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco Unified Wireless Network Architecture

Figure 4-9

Cisco Unified Wireless Network Architecture

Figure 4-10 illustrates one of the primary features of the architecture: how APs use the CAPWAP protocol to communicate with and tunnel traffic to a WLC.

Enterprise Mobility 8.5 Design Guide

4-16

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco Unified Wireless Network Security Features

Figure 4-10

CAPWAP APs and WLC Connection

CAPWAP has three primary functions: •

Control and management of the AP



Tunneling of WLAN client traffic to the WLC



Collection of 802.11 data for the management of the Cisco Unified Wireless IPv6

Cisco Unified Wireless Network Security Features The native 802.11 security features combined with the physical security and ease of deployment of the CAPWAP architecture serves to improve the overall security of WLAN deployments. In addition to the inherent security benefits offered by the CAPWAP protocol, the Cisco Unified Wireless Network solution also includes the following additional security features: •

Enhanced WLAN security options



ACL and firewall features



Dynamic Host Configuration Protocol (DHCP) and Address Resolution Protocol (ARP) protection



Peer-to-peer blocking



Wireless intrusion protection system (wIPS) – Client exclusion – Rogue AP detection



Management frame protection



Dynamic RF management



Architecture integration



IDS integration

Enterprise Mobility 8.5 Design Guide

4-17

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco Unified Wireless Network Security Features

Enhanced WLAN Security Options The Cisco Unified Wireless Network solution supports multiple concurrent WLAN security options. For example, multiple WLANs can be created on a WLC, each with its own WLAN security settings that can range from an open guest WLAN network and WEP networks for legacy platforms to the combinations of WPA and/or WPA2 security configurations. Each WLAN SSID can be mapped to either the same or different dot1q interface on the WLC, or Ethernet over IP (EoIP) tunneled to a different controller through a mobility anchor (Auto Anchor Mobility) connection. If a WLAN client authenticates via 802.1x, a dot1q VLAN assignment can be controlled by way of RADIUS attributes passed to the WLC upon successful authentication. Figure 4-11, Figure 4-12 and Figure 4-13 show a subset of the Unified Wireless Network WLAN configuration screen. The following four main configuration items appears: •

The WLAN SSID



The WLC interface to which the WLAN is mapped



The Layer 2security method (Figure 4-12)



The Layer 3 security method (Figure 4-13)

Figure 4-11

WLANs General Tab

Enterprise Mobility 8.5 Design Guide

4-18

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco Unified Wireless Network Security Features

Figure 4-12

WLANs Layer 2 Security Tab

Enterprise Mobility 8.5 Design Guide

4-19

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco Unified Wireless Network Security Features

Figure 4-13

Wlan LAN security Layer 3

Local EAP Authentication The WLC software provides local EAP authentication capability that can be used when an external RADIUS server is not available or becomes unavailable. The delay before switching to local authentication is configurable, as illustrated in Figure 4-14. When RADIUS server availability is restored, the WLC automatically switches back from local authentication to RADIUS server authentication.

Figure 4-14

Local Authentication Timeout

Enterprise Mobility 8.5 Design Guide

4-20

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco Unified Wireless Network Security Features

The EAP types supported locally on the WLC are LEAP, EAP-FAST, EAP-TLS, and PEAP. Figure 4-15 displays the window where you can select the local EAP profiles. Figure 4-15

Local EAP Profiles

WLC can use its local database for authentication data, and it can also access an LDAP directory to provide data for EAP-FAST or EAP-TLS authentication. The user credential database priority (LDAP versus Local) is configurable, as shown in Figure 4-16.

Enterprise Mobility 8.5 Design Guide

4-21

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco Unified Wireless Network Security Features

Figure 4-16

Local EAP Priority

ACL and Firewall Features An Access Control List (ACL) is a set of rules used to limit access to a particular interface (for example, if you want to restrict a wireless client from pinging the management interface of the controller). After ACLs are configured on the controller, they can be applied to the management interface, the AP-manager interface, any of the dynamic interfaces, or a WLAN to control data traffic to and from wireless clients or to the controller CPU to control all traffic destined for the CPU. You may also want to create a pre-authentication ACL for web authentication. Such an ACL could be used to allow certain types of traffic before authentication is complete. Both IPv4 and IPv6 ACL are supported. IPv6 ACLs support the same options as IPv4 ACLs including source, destination, source and destination ports. You can enable only IPv4 traffic in your network by blocking IPv6 traffic. That is, you can configure an IPv6 ACL to deny all IPv6 traffic and apply it on specific or all WLANs. •

You can define up to 64 ACLs, each with up to 64 rules (or filters) for both IPv4 and IPv6. Each rule has parameters that affect its action. When a packet matches all of the parameters for a rule, the action set for that rule is applied to the packet.



When you apply CPU ACLs on a Cisco 5500 Series Controller, Cisco 3504 Series Wireless Controller and 8500 Series Wireless Controller, you must permit traffic towards the virtual interface IP address for web authentication.



All ACLs have an implicit “deny all rule” as the last rule. If a packet does not match any of the rules, it is dropped by the controller.

Enterprise Mobility 8.5 Design Guide

4-22

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco Unified Wireless Network Security Features



If you are using an external web server with a Cisco 5500 Series Controller or a controller network module, you must configure a pre-authentication ACL on the WLAN for the external web server.



If you apply an ACL to an interface or a WLAN, wireless throughput is degraded when downloading from a 1-GBps file server. To improve throughput, remove the ACL from the interface or WLAN, move the ACL to a neighboring wired device with a policy rate-limiting restriction, or connect the file server using 100 Mbps rather than 1 Gbps.



Multicast traffic received from wired networks that is destined to wireless clients is not processed by WLC ACLs. Multicast traffic initiated from wireless clients, destined to wired networks or other wireless clients on the same controller, is processed by WLC ACLs.



ACLs are configured on the controller directly or configured through templates. The ACL name must be unique.



You can configure ACL per client (AAA overridden ACL) or on either an interface or a WLAN. The AAA overridden ACL has the highest priority. However, each interface, WLAN, or per client ACL configuration that you apply can override one another.



If peer-to-peer blocking is enabled, traffic is blocked between peers even if the ACL allows traffic between them.



Authentication traffic has to go through the Cisco WLC for this feature to be supported, even if DNS-based ACL is local to the AP.



When you create an ACL, it is recommended to perform the two actions (create an ACL or ACL rule and apply the ACL or ACL rule) continuously either from CLI or GUI.

Figure 4-17 displays the ACL Configuration page. The ACL can specify source and destination address ranges, protocols, source and destination ports, DSCP, and direction in which the ACL is to be applied. An ACL can be created out of a sequence of various rules.

Enterprise Mobility 8.5 Design Guide

4-23

Chapter 4 Cisco Unified Wireless Network Security Features

Figure 4-17

ACL Configuration Page

Enterprise Mobility 8.5 Design Guide

4-24

Cisco Unified Wireless Network Architecture—Base Security Features

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco Unified Wireless Network Security Features

Figure 4-18

Illustration of Flex Connect ACL

Layer 2 Access Control Lists You can configure rules for Layer 2 access control lists (ACLs) based on the Ethertype associated with the packets. Using this feature, if a WLAN with central switching is required to support only PPPoE clients, you can apply Layer 2 ACL rules on the WLAN to allow only PPPoE packets after the client is authenticated and the rest of the packets are dropped. Similarly, if the WLAN is required to support only IPv4 clients or only IPv6 clients, you can apply Layer 2 ACL rules on the WLAN to allow only IPv4 or IPv6 packets after the client is authenticated and the rest of the packets are dropped. For a locally-switched WLAN, you can apply the same Layer 2 ACL either for the WLAN or a FlexConnect AP. AP-specific Layer 2 ACLs can be configured only on FlexConnect APs. This is applicable only for locally-switched WLANs. The Layer 2 ACL that is applied to the FlexConnect AP takes precedence over the Layer 2 ACL that is applied to the WLAN.

Enterprise Mobility 8.5 Design Guide

4-25

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco Unified Wireless Network Security Features

Figure 4-19

Illustration of Layer 2 ACL available for configuration on the WLC

DNS-based Access Control Lists The DNS-based ACLs are used for client devices such as Apple and Android devices. When using these devices, you can set pre-authentication ACLs on the Cisco WLC to determine where devices have the right to go. To enable DNS-based ACLs on the Cisco WLC, you need to configure the allowed URLs for the ACLs. The URLs need to be pre-configured on the ACL. With DNS-based ACLs, the client when in registration phase is allowed to connect to the configured URLs. The Cisco WLC is configured with the ACL name and that is returned by the AAA server for pre-authentication ACL to be applied. If the ACL name is returned by the AAA server, then the ACL is applied to the client for web-redirection.

Enterprise Mobility 8.5 Design Guide

4-26

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco Unified Wireless Network Security Features

At the client authentication phase, the ISE server returns the pre-authentication ACL (url-redirect-acl). The DNS snooping is performed on the AP for each client until the registration is complete and the client is in SUPPLICANT PROVISIONING state. When the ACL configured with the URLs is received on the Cisco WLC, the CAPWAP payload is sent to the AP enabling DNS snooping on the client and the URLs to be snooped. With URL snooping in place, the AP learns the IP address of the resolved domain name in the DNS response. If the domain name matches the configured URL, then the DNS response is parsed for the IP address, and the IP address is sent to the Cisco WLC as a CAPWAP payload. The Cisco WLC adds the IP address to the allowed list of IP addresses and thus the client can access the URLs configured.

Restrictions on DNS-based Access Control Lists •

Maximum of 10 URLs can be allowed for an access control list.



For the Cisco WLC, 20 IP addresses are allowed for one client.



Local authentication is not supported for FlexConnect APs.



DNS-based ACLs are not supported on FlexConnect APs with Local Switching.



DNS-based ACLs are not supported on Cisco 1130 and 1240 series access points.



Authentication traffic has to go through the Cisco WLC to support this feature, even if DNS-based ACL is local to the AP.



If a client is anchored, be it auto-anchor or after roaming, DNS-based ACLs do not work.



DNS-based ACLs work only when RADIUS NAC (central web authentication or posture) are done on the SSID. DNS-based ACLs do not work with local web authentication or any other form of ACL other than a redirect-ACL used in the case of RADIUS NAC.

Figure 4-20

Illustration of DNS based ACL available for configuration on the WLC

URL Filtering or ACL In release 8.3 URL filtering was introduced and further enhanced in rel 8.4 . The URL Filtering feature helps optimize network bandwidth utilization by restricting access to websites. It uses DNS snooping to snoop the DNS response sent from the DNS server to wireless clients. It is an ACL based implementation

Enterprise Mobility 8.5 Design Guide

4-27

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco Unified Wireless Network Security Features

to restrict URLs for all protocol including HTTP and HTTPS. URL Filtering ACL is defined as set of URLs, which are associated with Allow/Deny action for all URLs. This is defined under an ACL type, either a white or black list. A mix of white and black list rules is not supported. An external server's ip address is configured which is used to redirect blocked page to client if the access URL is blocked as per configuration. WLC snoops the DNS response for the client and if the URL is allowed as per the configuration (ACL rule), DNS response will be sent to the client. If the URL is not allowed as per the configuration (ACL rule), the resolved IP will be overwritten with an external server's IP (which we would have configured) and returned to the client. This external server will redirect blocked page to the clients. Counters for the allowed and denied DNS responses are viewable for an ACL as they are getting hit.

Configuring URL Filtering URL filtering determines which URLs to permit or deny using ACLs and rules that are assigned to WLANs, Interfaces or individual client sessions by way of Local Policies. The following steps demonstrate how to create URL based ACLs and rules for two common scenarios: •

Scenario 1–An ACL with List Type Blacklist which has rules defined to deny access to specific URLs. This is commonly referred to as Blacklisting.



Scenario 2–An ACL with List Type Whitelist and rules are defined to only permit access to specific URLs. This is commonly referred to as Whitelisting.

Applying Access Control Lists URL ACLs can be assigned dynamically to clients using Local Policies or directly to WLANs or Interfaces: •

Local Policy–The URL ACL is applied to all clients assigned the Local Policy. URL ACLs assigned using Local Policies have the highest priority and will override URL ACLs assigned to the WLAN or Interface.



WLANs–The URL ACL is applied to all clients associated to the WLAN (unless a URL ACL is assigned to a client using a Local Policy). URL ACLs assigned to a WLAN will override a URL ACL assigned to an Interface.



Interfaces–The URL ACL is applied to all traffic forwarded specific interface.

1.

Feature support is available on 3504 ( begin with rel 8.5) , 5520 and 8540. It is not supported on 5508, 8510, vWLC, 2504 and ME.

2.

Supported in Local mode and Flex central switching only.

Platform Support

Considerations 1.

Wildcard support (e.g. *.domain.com)

2.

10 Wildcards

3.

5 subdomains per wildcard

4.

URL Filtering includes 1.

a.

Support of 100 URLs

No Sub-URL support (e.g. www.domain.com and www.domain.com/resources)

Enterprise Mobility 8.5 Design Guide

4-28

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco Unified Wireless Network Security Features

2.

Maximum length of 32 chars to be supported for URLs

3.

There is no AVC dependency for this feature. It is completely based on DNS snooping

4.

Radius server returning URL filtering ACL name is not supported

5.

Reverse DNS is not supported. Client access with direct IP (without doing DNS) is not allowed

6.

IPv6 is not supported

Configuration Steps 1.

Configure an ACL as either Whitelist or Blacklist to allow or deny access to domains

2.

Configure External Server IP address

3.

Tie the created URL ACL to either

a.

Interface

b.

WLAN

c.

Local Policy (highest priority)

4.

Browsing is now restricted to specified domains for all protocols

For complete configuration details of the URL filtering and ACLs please see the deployment guide at the URL below https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-4/b_URL_ACL_Enhanced_Dep loyment_Guide.html

Domain Filtering Domain Filtering is a new enhancement that is being introduced as part of the 8.3 release. This enhancement complements the Application Visibility Control (AVC) filtering currently available on the WLC. AVC filtering only supports the protocols and applications that are defined in the Protocol Pack for a given AirOS release allowing specific applications to be dropped, marked or rate-limited. Domain Filtering builds upon AVC by using the NBAR2 engine to look deeper into the application layer matching on both the application type (e.g. HTTP) and host (e.g. www.cisco.com). In the 8.3 release administrators can now define ACLs and rules which can be applied to WLANs, Interfaces or Local

Enterprise Mobility 8.5 Design Guide

4-29

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco Unified Wireless Network Security Features

Domain Filtering is based on the NBAR2 engines filtering capabilities using field extraction. The latest NBAR2 engine supports 120 custom applications. URLs can be defined as a custom application and be classified by the engine: 1.

URLs are classified using ACLs defined on the WLC. Each ACL has rules defined that determine the URLs to be matched.

2.

The NBAR2 engine is configured to extract the URL field (if present) in the packets passed to it. Field extraction is performed per flow to optimize performance.

3.

The WLC passes HTTP packets to the NBAR2 engine to extract the URL. If present, the NBAR2 engine returns the host-name (for example www.cisco.com) as the URL to the WLC.

4.

The WLC implements filtering logic for the extracted URLs and takes the appropriate forwarding action (i.e. permit or denies the flow).



This release supports a maximum of 100 x URL ACLs: – Each ACL supports a maximum of 64 rules. – Each rule has either a permit or deny action. At least one permit rule must be defined per URL

ACL for traffic to be permitted. – Each ACL has an implicit “deny all rule” as the last rule. If a URL does not match any of the

rules, it is dropped by the WLC. – Each rule is inspected in order of precedence (lowest to highest). The first rule in the ACL that

is matched is applied to the flow. – Each rule supports a maximum length 32 characters. – Each rule must match the exact subdomain, domain and top level domain you wish to match

(example www.cisco.com, tools.cisco.com or partners.cisco.com). – Partial matches using wildcards or regular expressions are not supported in this release

(example. www.c*.com or *.cisco.com). – No support for folders, file-names or extensions is provided in this release (example

www.cisco.com/resources/index.html). A rule matching www.cisco.com will be applied to www.cisco.com/c/en/us/support.index.html as well as http://www.cisco.com/c/en/us/buy.html. – One wildcard (*) rule with a permit or deny action is supported per ACL. The wildcard matches

all URLs.

Note



No support for AVC Profiles for matched URLs is provided in this release. URL ACLs and rules are defined separately then applied to WLANs, Interfaces or Local Policies.



No support for IPv6 in this release (IPv4 support only). • No support for PI is provided in this release.

Release 8.4 supports HTTP URLs only. HTTPS URL support will be introduced in a later release.

Configurations Steps for Domain Filtering Domain filtering is globally disabled on the WLC by default and must be enabled before the NBAR2 engine can inspect and filter HTTP based URLs. Domain filtering determines which HTTP based URLs to permit or deny using ACLs and rules that are assigned to WLANs, Interfaces or individual client sessions by way of Local Policies. The following steps demonstrate how to create URL based ACLs and rules for two common scenarios:

Enterprise Mobility 8.5 Design Guide

4-30

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Umbrella (Formally Open DNS) Filtering



Scenario 1—A ACL and rules are defined to deny access to specific HTTP URLs. This is commonly referred to as Blacklisting.



Scenario 2—A ACL and rules are defined to only permit access to specific HTTP URLs. This is commonly referred to as Whitelisting.

URL ACLs can be assigned dynamically to clients using Local Policies or directly to WLANs or Interfaces: – Local Policy–The URL ACL is applied to all clients assigned the Local Policy. URL ACLs

assigned using Local Policies have the highest priority and will override URL ACLs assigned to the WLAN or Interface. ? – WLANs–The URL ACL is applied to all clients associated to the WLAN (unless a URL ACL

is assigned to a client using a Local Policy). URL ACLs assigned to a WLAN will override a URL ACL assigned to an Interface. ? – Interfaces–The URL ACL is applied to all traffic forwarded specific interface.?The following

steps demonstrate how to assign URL ACLs on a WLC to WLANs, Interfaces and Local Policies. For complete deployment scanarios and configuration steps please review the Domain Filtering Deployment Guide at the link below https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-3/b_domain_filtering.html

Umbrella (Formally Open DNS) Filtering Cisco Umbrella introduced with release 8.4 is a Cloud delivered network security service, which gives insights to protect devices from malware and breach protection in real time. It uses evolving big data and data mining methods to proactively predict attacks also do category based filtering. Terminology involved in the working of the feature: API Token is issued from Cisco Umbrella Portal and is only used for device registration Device Identity is a unique device identifier. Policy is enforced per identifier EDNS is an Extension mechanism for DNS which carries tagged DNS packet FQDN is Fully Qualified Domain Name

DNS request always precedes web request. Wireless Lan Controller intercepts DNS request from the client and redirects the query to Cisco Umbrella in the cloud (208.67.222.222, 208.67.220.220). Cisco Umbrella servers resolve the DNS query and enforces preconfigured security filtering rules on a per identity basis to mark the domain as either malicious which will return a blocked page to client or safe returning resolved IP address to client.

Enterprise Mobility 8.5 Design Guide

4-31

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Umbrella (Formally Open DNS) Filtering

Cisco Umbrella General Work Flow

1.

WLC registration with Cisco Umbrella server is a one-time process and happens over a secure HTTPS tunnel

2.

Obtain API Token for device (WLC) registration from Cisco Umbrella dashboard

3.

Apply the Token on Wireless Lan Controller. This should register the device to Cisco Umbrella account. Next, create Cisco Umbrella Profile/s on WLC. Profiles will automatically be pushed to the Cisco Umbrella as Identities and policy will be enforced on a per identity basis

4.

Wireless client traffic flow from to Cisco Umbrella server

5.

A wireless client sends a DNS request to WLC

6.

WLC snoops the DNS packet and tags it with a Cisco Umbrella Profile. Profile is the identity of the packet which also resides on Cisco Umbrella

7.

This EDNS packet is redirected to the Cisco Umbrella cloud server for name resolution

8.

Cisco Umbrella then enforces a policy on it depending on the identity and applies category based filtering rules to ensure organization compliance

9.

Depending on the rules, it either returns a blocked page or resolved ip address to the client for the DNS request queried

Enterprise Mobility 8.5 Design Guide

4-32

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Umbrella (Formally Open DNS) Filtering

OpenDNS Support •

WLC supported platform- 3504 (Begin with rel 8.5), 5508,5520,7500,8510 and 8540.



ME, 2500 and vWLC are not supported



AP mode supported–Local mode, Flex central switching.



10 different OpenDNS Profiles configurable on WLC



Guest (Foreign–Anchor) scenario, profile applies at Anchor WLC

OpenDNS Limitations •

Client is connected to a web proxy and does not send DNS query to resolve the server address



Application or host uses IP address directly instead of DNS to query domains

Configuring the Cisco Umbrella Wireless LAN Controller Integration Step 1

Cisco Umbrella provisioning involves creating a user account on Cisco Umbrella cloud. Subscription is per account and Cisco Umbrella offers14 day obligation free trial license. Permanent License is covered under CiscoOne Advanced Subscription.

Step 2

Next, enable Wireless Controller (GUI or CLI) for Cisco Umbrella .

Step 3

WLC registers to the cloud account over a secure HTTPS tunnel.

Step 4

Configure profiles (identities) on WLC. Profile can be mapped to either WLAN, AP group or incorporated into local policy.

Step 5

WLC redirects DNS packets to Cisco Umbrella cloud.

Step 6

Security policies on Cisco Umbrella are applied per Identity. Enterprise Mobility 8.5 Design Guide

4-33

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Umbrella (Formally Open DNS) Filtering

Cisco Umbrella configuration steps on Wireless Controller involve enabling Cisco Umbrella function, configuring API Token, creating Profile/s and mapping the profile to either a WLAN, an AP group or a Local Policy. The policy priority order (starting from highest) is: a. Local Policy b. AP Group c. WLAN

Cisco Umbrella profile when mapped to local policy allows for a granular differentiated user browsing experience based on dynamic evaluation of attributes (user role, device type etc). For complete deployment scenarios and configuration steps please the Umbrella Integration Guide at the link below https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-4/b_cisco_umbrella_wlan_integ ration_guide.html

DHCP and ARP Protection The WLC acts as a relay agent for WLAN client DHCP requests. In doing so, the WLC performs a number of checks to protect the DHCP infrastructure. The primary check is to verify that the MAC address included in the DHCP request matches the MAC address of the WLAN client sending the request. This protects against DHCP exhaustion attacks, by restricting a WLAN client to one DHCP request (IP address) for its own interface. The WLC by default does not forward broadcast messages from WLAN clients back out onto the WLAN, which prevents a WLAN client from acting as a DHCP server and spoofing incorrect DHCP information. The WLC acts as an ARP proxy for WLAN clients by maintaining the MAC address-IP address associations. This allows the WLC to block duplicate IP address and ARP spoofing attacks. The WLC does not allow direct ARP communication between WLAN clients. This also prevents ARP spoofing attacks directed at WLAN client devices.

Peer-to-Peer Blocking The WLC can be configured to block communication between clients on the same WLAN. This prevents potential attacks between clients on the same subnet by forcing communication through the router. Figure 4-21 is the configuration screen for peer-to-peer blocking on the WLC. Note

This is a not a global setting on the WLC and applies to a specific WLANs in later releases.

Enterprise Mobility 8.5 Design Guide

4-34

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Umbrella (Formally Open DNS) Filtering

Figure 4-21

Peer-to-Peer Blocking

Wireless IDS The WLC performs WLAN IDS analysis using information obtained from all of the connected APs, and reports detected attacks to WLC as well to the WCS. The Wireless IDS analysis is complementary to any analysis that can otherwise be performed by a wired network IDS system. The embedded Wireless IDS capability of the WLC analyzes 802.11and WLC-specific information that is not otherwise visible or available to a wired network IDS system. The wireless IDS signature files used by the WLC are included in WLC software releases; however, they can be updated independently using a separate signature file. Custom signatures are displayed in the Custom Signatures window. Figure 4-22 is the Standard Signatures window in the WLC.

Enterprise Mobility 8.5 Design Guide

4-35

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Umbrella (Formally Open DNS) Filtering

Figure 4-22

Standard WLAN IDS Signatures

Cisco Adaptive Wireless Intrusion Prevention System The Cisco Adaptive wireless Intrusion Prevention System (wIPS) is an advanced approach to wireless threat detection and performance management. It combines network traffic analysis, network device and topology information, signature-based techniques, and anomaly detection to deliver highly accurate and complete wireless threat prevention. With a fully infrastructure-integrated solution, you can continually monitor wireless traffic on both the wired and wireless networks and use that network intelligence to analyze attacks from many sources to more accurately pinpoint and proactively prevent attacks rather than waiting until damage or exposure has occurred. The Cisco Adaptive wIPS is enabled by the Cisco Mobility Services Engine (MSE), which centralizes the processing of intelligence collected by the continuous monitoring of Cisco Aironet access points. With Cisco Adaptive wIPS functionalities and Cisco Prime Infrastructure integration into the MSE, the wIPS service can configure, monitor, and report wIPS policies and alarms. The Cisco Adaptive wIPS is not configured on the controller. Instead, the Prime Infrastructure forwards the profile configuration to the wIPS service, which forwards the profile to the controller. The profile is stored in flash memory on the controller and sent to access points when they join the controller. When an access point disassociates and joins another controller, it receives the wIPS profile from the new controller. Local mode or FlexConnect mode access points with a subset of wIPS capabilities is referred to as Enhanced Local Mode access point or ELM AP. You can configure an access point to work in wIPS mode if the access point is in any of the following modes described below.

Enterprise Mobility 8.5 Design Guide

4-36

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Umbrella (Formally Open DNS) Filtering

wIPS Communication Protocols To provide communication between each system component, a number of protocols are utilized: •

CAPWAP (Control and Provisioning of Wireless Access Points)—This protocol is utilized for communication between Access Points and controllers. It provides a bi-directional tunnel in which alarm information is shuttled to the controller and configuration information is pushed to the Access Point. CAPWAP control messages are DTLS encrypted and CAPWAP data has the option to be DTLS encrypted.



NMSP (Network Mobility Services Protocol)—This protocol is used for communication between Wireless LAN Controllers and the Mobility Services Engine. In the case of a wIPS Deployment, this protocol provides a pathway for alarm information to be aggregated from controllers to the MSE and for wIPS configuration information to be pushed to the controller. This protocol is encrypted. – Controller TCP Port: 16113



SOAP/XML (Simple Object Access Protocol)—This protocol is a method of communication between the MSE and PI. This protocol is used to distribute configuration parameters to the wIPS service running on the MSE. – oMSE TCP Port: 443



SNMP (Simple Network Management Protocol)—This protocol is used to forward wIPS alarm information from the Mobility Services Engine to the Prime Infrastructure. It is also utilized to communicate rogue access point information from the Wireless LAN Controller to the Prime Infrastructure.

wIPS Deployment Modes Beginning with the 7.4 Release, Cisco Adaptive Wireless IPS has three options for wIPS mode access points. To better understand the differences between the wIPS mode access points, lets discuss about each mode.

Enterprise Mobility 8.5 Design Guide

4-37

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Umbrella (Formally Open DNS) Filtering

Local Mode with wIPS Local Mode with wIPS provides wIPS detection “on-channel”, which means attackers will be detected on the channel that is serving clients. For all other channels, ELM provides best effort wIPS detection. This means that every frame the radio would go “off-channel” for a short period of time. While "off-channel", if an attack occurs while that channel is scanned, the attack will be detected. An example of Local Mode with wIPS on an AP3600, the 2.4 GHz radio is operating on channel 6. The AP will constantly monitor channel 6, any attacks on channel 6 will be detected and reported. If an attacker attacks channel 11, while the AP is scanning channel 11 “off-channel”, the attack will be detected. The features of ELM are: •

Adds wIPS security scanning for 7x24 on channel scanning (2.4 GHz and 5 GHz), with best effort off channel support.



The access point is additionally serving clients and with the G2 Series of Access Points enables CleanAir spectrum analysis on channel (2.4 GHz and 5 GHz).



Adaptive wIPS scanning in data serving local and FlexConnect APs.



Protection without requiring a separate overlay network.



Supports PCI compliance for the wireless LANs.



Full 802.11 and non-802.11 attack detection.



Adds forensics and reporting capabilities.



Flexibility to set integrated or dedicated MM APs.



Pre-processing at APs minimize data backhaul (that is, works over very low bandwidth links).



Low impact on the serving data.

Enterprise Mobility 8.5 Design Guide

4-38

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Umbrella (Formally Open DNS) Filtering

Monitor Mode Monitor Mode provides wIPS detection "off-channel", which means the access point will dwell on each channel for an extend period of time, this allows the AP to detect attacks on all channels. The 2.4GHz radio will scan all 2.4GHz channels, while the 5GHz channel scans all 5GHz channels. An additional access point would need to be installed for client access. Some of the features of Monitor Mode are: •

The Monitor Mode Access Point (MMAP) is dedicated to operate in Monitor Mode and has the option to add wIPS security scanning of all channels (2.4GHz and 5GHz).



The G2 Series of Access Points enable CleanAir spectrum analysis on all channels (2.4GHz and 5GHz).



MMAPs do not serve clients.

Dedicated Monitor Mode versus ELM Figure 4-23 illustrates a contrast between the standard deployments of wIPS monitor mode and APs with the ELM feature. The typical coverage range for both modes suggests: •

Dedicated wIPS monitor mode APs (shown in red in Figure 4-23) typically covers 15,000 to 35,000 square feet.



APs with the ELM feature (shown in yellow in Figure 4-23) typically cover from 3,000 to 5,000 square feet.

Figure 4-23

Monitor Mode versus ELM

In the traditional wIPS deployment, a recommended ratio is 1 monitor mode AP to every 5 local mode APs (ratio can vary based on network design and expert guidance for best coverage). With ELM, you simply enable the ELM feature for all of the APs, effectively adding monitor mode wIPS operations to local data-serving mode AP while still maintaining performance.

Enterprise Mobility 8.5 Design Guide

4-39

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Umbrella (Formally Open DNS) Filtering

AP 3600/3700 with Wireless Security Module (WSM): The Evolution of Wireless Security and Spectrum A Cisco 3600/3700 series Access point with the WSM module (AIR-RM300M=) uses a combination of "on-channel" and "off-channel". This means that the AP3600/3700 2.4 GHz and 5 GHz will scan the channel that they are serving clients and the WSM module would operate in monitor mode and scan all channels. Some of the features of the WSM Module are: •

Industry's first Access Point enabling the ability to simultaneously Serve clients, wIPS security scan, and analyze the spectrum using CleanAir Technology.



Dedicated 2.4 GHz and 5 GHz radio with its own antennas enabling 7x24 scanning of all wireless channels in the 2.4 GHz and 5 GHz bands.



A single Ethernet infrastructure provides simplified operation with fewer devices to manage and optimized return on investment of the AP3600 wireless infrastructure and the Ethernet wired infrastructure.

Cisco gen 1 module wireless security module (AIR-RM3000M=) is capable of scanning attacks over the air only on 20 MHz channel. It is incapable of detecting attacks on 11ac rates. Cisco introduced the new Hyperlocation module with advanced security (AIR-RM3010L-x-K9= )that is capable to detecting attacks on 11ac rates and reporting to the MSE. Following is the comparison table with differences between the two security modules. The part numbers are different and WSM can only scan 20MHz channels while ASM can scan 20/40/80MHz. Both are field upgradable modules that go on 3600 and 3700 APs. The gen2 modules comes with a hyper location antenna array for location accuracy and it can work independently of the antenna array.

Enterprise Mobility 8.5 Design Guide

4-40

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP

WIPS monitoring on 2800, 3800 and 1560 AP Flexible Radio Assignment, allows for either manual configuration or for the APs to intelligently determine the operating role of the integrated radios based on the available RF environment. The AP can operate in Wireless Security Monitoring and 5 GHz role, where one radio serves 5 GHz clients, while the other radio scans both 2.4 GHz and 5 GHz for wIPS attackers, CleanAir interferers, and rogue devices. When a radio is on its serving channel it is considered “on-channel”, when the radio is scanning other channels, it is considered “off-channel”. There are three deployment scenarios in which an AP can be configured for WIPS scanning. ELM global mode with FRA radio in client serving offering best effort off channel support. Local Mode with wIPS provides wIPS detection “on-channel”, which means attackers will be detected on the channel that is serving clients. For all other channels, ELM provides best effort wIPS detection. This means that every frame the radio would go “off-channel” for a short period of time. While “off-channel”, if an attack occurs while that channel is scanned, the attack will be detected. FRA radio in ELM client serving mode is still capable of serving clients.

ELM global mode with FRA radio in monitor mode. While ELM mode offers best effort scanning on radio slot 1 (5GHz), monitor mode on FRA radio provides dedicated wIPS detection “off-channel”, which means the access point will dwell on each channel for an extend period of time, this allows the AP to detect attacks on all channels. FRA radio in monitor mode is incapable of serving clients.

Enterprise Mobility 8.5 Design Guide

4-41

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

AP in Monitor mode provides dedicated wIPS security scanning of all channels (2.4GHz and 5GHz) for over the air attacks.

WIPS monitoring on 1800 AP Platform(1810, 1815, 1850, 1830) Similarly, 1800 Wave 2 Access Points including 1810, 1815, 1850 and 1830 can be deployed in a network for over the air scanning for wIPS attackers, CleanAir interferers, and rogue devices. The AP platform supports wips scanning only in Local mode, Monitor mode is not supported.

Enterprise Mobility 8.5 Design Guide

4-42

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP

ELM mode – Local AP mode with WIPS as Sub Mode Local Mode with wIPS provides wIPS detection “on-channel”, which means attackers will be detected on the channel that is serving clients. For all other channels, ELM provides best effort wIPS detection. This means that every frame the radio would go “off-channel” for a short period of time. While “off-channel”, if an attack occurs while that channel is scanned, the attack will be detected. FRA radio in ELM client serving mode is still capable of serving clients.

For additional information and configuration steps please see wIPS deployment guide at the link below: https://www.cisco.com/c/en/us/td/docs/wireless/technology/wips/deployment/guide/WiPS_deployment _guide.html

On-Channel and Off-Channel Performance When an AP visits a channel, the time the AP stays on that channel, to detect and classify an attack, is known as the dwell time. ELM primary feature operates effectively for on-channel attacks, without any compromise to the performance on data, voice and video clients, and services. In contrast, the local mode varies off-channel scanning providing minimal dwell time to detect and classify an attack. For example, due to radio resource management (RRM), when voice clients are associated to an AP scanning is deferred until the voice client is disassociated in order to ensure service is not affected. In this example, ELM detection during off-channel is considered best effort. Neighboring ELM APs operating on all/country/DCA channels increases effectiveness, hence the recommendation for enabling ELM on every local mode AP for maximum coverage protection. If your requirement is for dedicated scanning on all channels full-time, then we recommend deploying monitor mode APs. Generally, the differences between local mode and monitor mode APs are: •

Local Mode AP—Serves WLAN clients with time slicing off-channel scanning, listens for 50 ms on each channel, and features configurable scanning for all/country/DCA channels.



Monitor Mode AP—Does not serve WLAN clients, dedicated to scanning only, listens for 1.2 sec on each channel, and scans all channels.

The figure below explains the radio's behavior. When a radio is on its serving channel it is considered “on-channel”, when the radio is scanning other channels, it is considered "off-channel". An AP in local mode is mostly "on-channel", making it difficult to detect attackers "off-channel". A monitor mode AP is always "off-channel", but cannot server clients, the WSM module provides a great combination of both.

Enterprise Mobility 8.5 Design Guide

4-43

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

ELM Across WAN Links Cisco has optimized features in challenging topologies, such as deploying ELM APs across low bandwidth WAN links. The ELM feature involves pre-processing to determine attack signatures at the AP and is optimized to work over slower links. We recommend to test and measure the baseline to validate performance with ELM over WAN.

CleanAir Integration Cisco CleanAir technology is a spectrum-aware, self-healing, and self-optimizing wireless network that mitigates the impact of wireless interference and offers performance protection for 802.11n networks. The ELM feature compliments CleanAir operations with similar performance and benefits as monitor mode AP deployments, including these existing CleanAir spectrum-aware benefits: •

Dedicated silicon-level RF intelligence



Spectrum-aware, self-healing, and self-optimizing



Non-standard channel threat and interference detection and mitigation



Non-Wi-Fi detection such as Bluetooth, microwave, cordless phones, and so forth



Detect and locate RF layer DOS attacks such as RF jammers

Enterprise Mobility 8.5 Design Guide

4-44

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP

ELM wIPS Alarm Flow Attacks are only relevant when they occur on trusted APs. The ELM APs will detect an attack, then communicate, correlate, and report to the management system Cisco Prime Generally, the alarm flow process is: 1.

Attack is launched against a trusted AP.

2.

Detection on the AP with ELM feature communicates through CAPWAP to WLC.

3.

Passed transparently to MSE via NMSP.

4.

Log into wIPS database on MSE and send to the management system Cisco Prime by way of an SNMP trap.

5.

Display at the management system Cisco Prime.

Cisco Adaptive wIPS Alarms The controller supports five Cisco Adaptive wIPS alarms that serve as notifications for potential threats. You must enable these alarms based on your network topology using Cisco Prime Infrastructure. For more details on this, see the Cisco Prime Infrastructure User Guide. •

Device not protected by VPN—The controller generates an alarm when a wireless client and access point does not communicate over secure VPN, as all controller traffic must be routed through a VPN connection.



WPA Dictionary Attack—The controller generates an alarm when a dictionary attack on the WPA security key occurs. The attack is detected before the initial handshake message between the client and the access point.



WiFi Direct Session Detected—The controller generates an alarm when Wifi direct sessions of clients are detected with Wifi direct and prevents enterprise vulnerability.



RSN Info Element Out-of-Bound Denial-of-Service—The controller generates an alarm when there are large values for RSN information element that results in an access point crash.



DS Parameter Set DoS—The controller generates an alarm when confusion exists in the channel for the client while multiple channels overlap.

The Adaptive wIPS system follows a linear chain of communication to propagate attack information obtained from scanning the airwaves to the console of the Prime Infrastructure.

Enterprise Mobility 8.5 Design Guide

4-45

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

Figure 4-24

Threat Detection Alarm Flow

1.

In order for an alarm to be triggered on the Cisco Adaptive wIPS system, an attack must be launched against a legitimate Access Point or Client. Legitimate Access Points and clients are discovered automatically in a Cisco Unified Wireless Network by 'trusting' devices broadcasting the same 'RF-Group' name. In this configuration, the system dynamically maintains a list of local-mode Access Points and their associated clients. The system can also be configured to 'trust' devices by SSID using the SSID Groups feature. Only attacks, which are considered harmful to the WLAN infrastructure, are propagated upwards to the rest of the system.

2.

Once an attack has been identified by the wIPS Mode Access Point engine, an alarm update is sent to the Wireless LAN Controller and is encapsulated inside the CAPWAP control tunnel.

3.

The Wireless LAN Controller will transparently forward the alarm update from the Access Point to the wIPS Service running on the Mobility Services Engine. The protocol used for this communication is NMSP.

4.

Once received by the wIPS Service on the Mobility Services Engine, the alarm update will be added to the alarm database for archival and attack tracking. An SNMP trap is forwarded to the Prime Infrastructure containing the attack information. If multiple alarm updates are received referencing the same attack (for example, if multiple Access Points hear the same attack) only one SNMP trap will be sent to Prime Infrastructure.

5.

The SNMP trap containing the alarm information is received and displayed by Prime Infrastructure.

Deployment Considerations - Required Components The basic system components for a Cisco Adaptive wIPS system include: •

Access Points in wIPS Monitor Mode, in Local Mode with wIPS, or with a wireless security module



Wireless LAN Controller(s)



A Mobility Services Engine running the wIPS Service



A Prime Infrastructure

The minimum code versions required for an Adaptive wIPS system: •

Available with Cisco Mobility Services Engine Software Release 5.2.xxx or later



Requires Cisco Prime Infrastructure, version 1.3.



Requires 7.2.xxx or later on Cisco Wireless LAN Controllers

Enterprise Mobility 8.5 Design Guide

4-46

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP



Release 7.2 and later wireless IPS functionality requires monitor mode (that is, non-client-serving) access points



Release 7.2.xxx and later wireless IPS functionality requires access points in local mode with wIPS (that is, client-serving)

The minimum code versions required for the Wireless Security Module (WSM): •

Wireless LAN Controller(s)—Version 7.4.XX or greater



Cisco Prime Infrastructure—Version 1.3.XX or greater



Mobility Services Engine—Version 7.4.XX or greater

How Many wIPS Access Points do I need? Before deploying an Adaptive wIPS system, it is important to consider that the communications range of an access point's cell is less than the actual range at which frames may be received and decoded. The reason for this discrepancy is that an Access Point's communication range is limited by the weakest link - which in typical deployments is the WLAN client. Given that the output power of a WLAN client is intrinsically less than the Access Point's maximum, the range of the cell is restricted to the client's abilities. In addition, it is recommended practice to run Access Points at less than full power to build RF redundancy and load balancing into the wireless network. These aforementioned fact combined with the superior receive sensitivity of Cisco's Access Points allows the Adaptive wIPS system to be deployed with less access point density than the client serving infrastructure while still providing pervasive monitoring.

As depicted in the above diagram, a wIPS deployment is based on hearing 802.11 management and control frames which are used by a majority of attacks to cause harm. This is in contrast to a data Access Points deployment that is surveyed to provide higher throughput data rates anywhere from 24Mbps to 54Mbps.

Enterprise Mobility 8.5 Design Guide

4-47

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

There are numerous factors that go into deciding exactly the number of wIPS Access Points that are required for a specific environment. Given that each prospective deployment's security requirements and environmental conditions are different, there is no hard and fast rule that will address the needs of every deployment but a few generalized guidelines must be taken into account. The main factors, which affect the number of wIPS Access Points required, are as follows.

Access Point Density Recommendations The square footage of access point coverage can be measured based on frequency and environment, but with the newer wIPS modes, other factors also contribute to wIPS access point density recommendations. All access point modes can monitor the same distance, but due to the reasons below, we recommend to deploy each mode with a different density. Access Points in local mode with wIPS are geared towards serving clients. For local mode with wIPS deployments, it is recommended for every access point be put in local mode with wIPS. For monitor mode access points, we recommend that a ratio of 1:5 local mode to monitor mode access points. Finally for the WSM module, there is a single radio monitoring all channels on both the 2.4 GHz and 5 GHz band. Since radio has additional channels to scan, it is recommended that the WSM module be deployed with a 2:5 density to speed up detection time.

wIPS Integrated in a Cisco Unified Wireless Network An integrated wIPS deployment is a system design in which non-wIPS Mode Access Points and wIPS Mode Access Points are intermixed on the same controller(s) and managed by the same Prime Infrastructure. This can be any combination of local mode, flex connect mode, local mode with wIPS,

Enterprise Mobility 8.5 Design Guide

4-48

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP

monitor mode, and 3600 series Access points with the WSM module. Overlaying wIPS protection and data shares many of the components including controllers and Prime Infrastructure thus reducing duplicate infrastructure costs.

Forensics The Cisco Adaptive wIPS system provides the ability to capture attack forensics for further investigation and troubleshooting purposes. At a base level, the forensics capability is a toggle-based packet capture facility, which provides the ability to log and retrieve a set of wireless frames. This feature is enabled on a per attack basis from within the wIPS profile configuration of PI. Once enabled, the forensics feature is triggered once a specific attack alarm is seen over the airwaves. The forensic file will be created based on the packets contained within the buffer of the wIPS Mode AP that triggered the original alarm. This file is transferred to the Wireless LAN Controller via CAPWAP, which then forwards the forensic file via NMSP to the wIPS Service running on the Mobility Services Engine. The file is stored within the forensic archive on the MSE until the user configured disk space limit for forensics is reached. By default this limit is 20 GB, which when reached will cause the oldest forensic files to be removed. Access to the forensic file can be obtained by opening the alarm on the Prime Infrastructure, which contains a hyperlink to the forensic file. The files are stored as a '.CAP' file format which can be opened by either WildPacket's Omnipeek, AirMagnet Wi-Fi Analyzer, Wireshark or any other packet capture program which supports this format. See Wireshark for detailed information.

Enterprise Mobility 8.5 Design Guide

4-49

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

Client Exclusion In addition to Wireless IDS, the WLC is able to take additional steps to protect the WLAN infrastructure and WLAN clients. The WLC is able to implement policies that exclude WLAN clients whose behavior is considered threatening or inappropriate. Figure 4-25 shows the Exclusion Policies window, containing the following currently supported client exclusion policies: •

Excessive 802.11 association failures—Possible faulty client or DoS attack



Excessive 802.11 authentication failures—Possible faulty client or DoS attack



Excessive 802.1X authentication failures—Possible faulty client or DoS attack



Maximum 802.1X —AAA Failure Attempts (1-10)



IP theft or IP reuse—Possible faulty client or DoS attack



Excessive web authentication failures—Possible DoS or password-cracking attack

Enterprise Mobility 8.5 Design Guide

4-50

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP

Figure 4-25

Client Exclusion Policies

Managing Rogue Devices and Policies Rogue access points can disrupt wireless LAN operations by hijacking legitimate clients and using plain-text or other denial-of-service or man-in-the-middle attacks. That is, a hacker can use a rogue access point to capture sensitive information, such as usernames and passwords. The hacker can then transmit a series of Clear to Send (CTS) frames. This action mimics an access point, informing a particular client to transmit, and instructing all the other clients to wait, which results in legitimate clients being unable to access network resources. Wireless LAN service providers have a strong interest in banning rogue access points from the air space.

Rogue Location Discovery Protocol Cisco Rogue Location Discovery Protocol (RLDP) is an active approach, which is used when rogue AP has no authentication (Open Authentication) configured. This mode, which is disabled by default, instructs an active AP to move to the rogue channel and connect to the rogue as a client. During this time,

Enterprise Mobility 8.5 Design Guide

4-51

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

the active AP sends de-authentication messages to all connected clients and then shuts down the radio interface. Then, it associates to the rogue AP as a client. The AP then tries to obtain an IP address from the rogue AP and forwards a User Datagram Protocol (UDP) packet (port 6352) that contains the local AP and rogue connection information to the controller through the rogue AP. If the controller receives this packet, the alarm is set to notify the network administrator that a rogue AP was discovered on the wired network with the RLDP feature. RLDP has 100% accuracy in rouge AP detection. It detects Open APs and NAT APs.

Detecting Rogue Devices The controller continuously monitors all the nearby access points and automatically discovers and collects information on rogue access points and clients. When the controller discovers a rogue access point, it uses the Rogue Location Discovery Protocol (RLDP) and the rogue detector mode access point is connected to determine if the rogue is attached to your network. Controller initiates RLDP on rogue devices that have open authenticated and configured. If RLDP uses Flexconnect or local mode access points, then clients are disconnected for that moment. After the RLDP cycle, the clients are reconnected to the access points. As and when rogue access points are seen (auto-configuration), the RLDP process is initiated. You can configure the controller to use RLDP on all the access points or only on the access points configured for the monitor (listen-only) mode. The latter option facilitates automated rogue access point detection in a crowded radio frequency (RF) space, allowing monitoring without creating unnecessary interference and without affecting the regular data access point functionality. If you configure the controller to use RLDP on all the access points, the controller always chooses the monitor access point for RLDP operation if a monitor access point and a local (data) access point are both nearby. If RLDP determines that the rogue is on your network, you can choose to contain the detected rogue either manually or automatically. RLDP detects on wire presence of the rogue access points that are configured with open authentication only once, which is the default retry configuration.

Enterprise Mobility 8.5 Design Guide

4-52

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP

Figure 4-26

Illustration of the RLDP configuration

A rogue access point is moved to a contained state either automatically or manually. The controller selects the best available access point for containment and pushes the information to the access point. The access point stores the list of containments per radio. For auto containment, you can configure the controller to use only the monitor mode access point.

Rogue Detection Policies Parameters Make sure that rogue detection is enabled for the corresponding access points. Rogue detection is enabled by default for all access points joined to the controller (except for OfficeExtend access points).

Enterprise Mobility 8.5 Design Guide

4-53

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

1.

2.

Rogue Detection Security Level following options: •

Low—Basic rogue detection for small-scale deployments.



High—Basic rogue detection with auto containment for medium-scale deployments.



Critical—Basic rogue detection with auto containment and RLDP for highly sensitive deployments.



Custom—For auto RLDP, the security level should be set to Custom mode. There should not be any scheduling for RLDP even in the Custom mode.

Rogue Location Discovery Protocol AP options: •

Disable—Disables RLDP on all the access points. This is the default value.



All APs—Enables RLDP on all the access points.



Monitor Mode APs—Enables RLDP only on the access points in the monitor mode.

Enterprise Mobility 8.5 Design Guide

4-54

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP

3.

Rogue Client Validation—use the AAA, MSE server or local database to validate if rogue clients are valid clients, select the Validate Rogue Clients. MSE responds with information about whether the rogue client is a valid learned client or not. The controller can contain or consider the rogue client as a threat.

4.

Detect and Report Ad-Hoc Networks—if necessary select ad hoc rogue detection and reporting.

5.

Rogue Detection Report Interval—the time interval, in seconds, at which APs should send the rogue detection report to the controller. The valid range is 10 seconds to 300 seconds, and the default value is 10 seconds.

6.

Rogue Detection Minimum RSSI—the minimum Received Signal Strength Indicator (RSSI) value that a rogue entry should have for APs to detect the rogue and for a rogue entry to be created in the controller. The valid range is -128 dBm to -0 dBm, and the default value is 0 dBm. This feature is applicable to all the AP modes. There can be many rogues with very weak RSSI values that do not provide any valuable information in rogue analysis. Therefore, you can use this option to filter rogues by specifying the minimum RSSI value at which APs should detect rogues.

7.

Rogue Detection Transient Interval—time interval at which a rogue should be scanned for by the AP after the first time the rogue is scanned. After the rogue is scanned for consistently, updates are sent periodically to the controller. Thus, the APs filter the transient rogues, which are active for a very short period and are then silent. The valid range is between 120 seconds to 1800 seconds, and the default value is 0. The rogue detection transient interval is applicable to the monitor mode APs only.

Enterprise Mobility 8.5 Design Guide

4-55

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

This feature has the following advantages: •

Rogue reports from APs to the controller are shorter.



Transient rogue entries are avoided in the controller.



Unnecessary memory allocation for transient rogues are avoided.

8.

Rogue Client Threshold—the threshold value. A value of 0 disables the rogue client threshold parameter.

9.

Rogue Containment Automatic Rate Selection—Using this option, you can optimize the rate to use the best rate for the target rogue. The AP selects the best rate based on rogue RSSI.

10. Containment—If you want the controller to automatically contain certain rogue devices, enable the

following parameters.

Caution



Auto Containment Level—Set the auto containment level. By default, the auto containment level is set to 1. If you choose Auto, the controller dynamically chooses the number of APs required for effective containment.



Auto Containment only for Monitor mode APs—Configure the monitor mode access points for auto-containment.



Auto Containment on FlexConnect Standalone—Standalone StaFlexConnect Standalone mode access points for auto containment.



The auto-containment is continued if it was configured when the AP was in connected FlexConnect mode. After the standalone AP reassociates with the controller, auto containment is stopped and the future course of action is determined by the configuration on the controller that the AP is associated with. You can also configure auto containment on the ad hoc SSIDs and managed SSIDs on FlexConnect APs.



Rogue on Wire—Configure the auto containment of rogues that are detected on the wired network.



Using Our SSID—Configure the auto containment of rogues that are advertising your network's SSID. If you leave this parameter unselected, the controller only generates an alarm when such a rogue is detected.



Valid Client on Rogue AP—Valid Client on Rogue APed, the controller only generates an alarm when such a rogue associated. If you leave this parameter unselected, the controller only generates an alarm when such a rogue is detected.



AdHoc Rogue AP—Rogue APue AP this parameter unselected, the controller only generates an alarm when such this parameter unselected, the controller only generates an alarm when such a network is detected.

When you select any of the Auto Contain parameters and click Apply, the following message is displayed: "Using this feature may have legal consequences. Do you want to continue?" The 2.4-GHz and 5-GHz frequencies in the Industrial, Scientific, and Medical (ISM) band are open to the public and can be used without a license. As such, containing devices on another party's network could have legal consequences. Figure 4-27 Illustrates Rogue Policies configuration options; RLDP security levels and enablement on the Aps; also it shows the validation configuration against AAA or MSE.

Enterprise Mobility 8.5 Design Guide

4-56

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP

Figure 4-27

Configuring Rogue Policies

Rogue AP The Cisco Unified Wireless Networking solution, as shown in Figure 4-28, provides a complete solution for rogue APs. This solution provides: •

Air/RF detection—Detection of rogue devices by observing/sniffing beacons and 802.11 probe responses.



Rogue AP location—Use of the detected RF characteristics and known properties of the managed RF network to locate the rogue device.



Wire detection—A mechanism for tracking/correlating the rogue device to the wired network.



Rogue AP isolation—A mechanism to prevent client connection to a rogue AP.

Enterprise Mobility 8.5 Design Guide

4-57

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

Figure 4-28

Unified Wireless Network Rogue AP Detection

Air/RF Detection The two AP RF detection deployment models are: •

Standard AP deployment



Monitor mode AP deployment

Both deployment models support RF detection and are not limited to rogue APs, but can also capture information upon detection of ad-hoc clients and rogue clients (the users of rogue APs). An AP that is configured for monitor mode is dedicated to scanning the RF channels and does not support client association or data transmission. When searching for rogue APs, an AP goes off channel for 50 ms to listen for rogue clients, and to monitor noise and channel interference. The channels scanned are configured in the global WLAN network parameters for 802.11a and 802.11b/g. Any detected prospective rogue client(s) and/or access points are sent to the controller to gather the following information: •

Rogue AP MAC address

Enterprise Mobility 8.5 Design Guide

4-58

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP



Rogue AP name



Rogue connected client(s) MAC address



Whether the frames are protected with WPA, WEP and WEP2



The preamble



Signal-to-noise ratio (SNR)



Received signal strength indication (RSSI)



Switchport tracing

The prospective rogue client/AP is not labeled a rogue until the WLC receives another report from a trusted AP or until the completion of a second detection cycle. The trusted AP moves to the same channel, as the prospective rogue, to monitor for rogue client/AP, noise, or interference. If the same client/AP is detected a second time, they are then labeled as rogue on the WLC. Once labeled as a rogue, the WLC determines if this rogue is attached to the local network or is simply a neighboring AP. In either case, an AP that is not part of the managed Cisco Unified Wireless Network is considered a rogue. In monitor mode, the trusted AP does not carry user traffic; it is dedicated to scanning channels. This mode of deployment is most common when a customer does not want to support WLAN services in a particular area, but wants to monitor that area for rogue APs and rogue clients.

Location The location features of Cisco Prime Infrastructure can be used to provide a floor plan indicating the approximate location of a rogue AP. The floor plan displays the location of all legitimate APs, and highlights the location of a rogue AP with the skull-and-crossbones icon. For additional information on the Cisco Unified Wireless Network location features, see Cisco Wireless Location Appliance.

Wire Detection Situations can exist where the Cisco Prime Infrastructure rogue location feature is not effective, such as in branch offices with only a few APs or where floor plan information might not be available. In these cases, the Cisco Unified Wireless Network solution offers two wire-based detection options: •

Rogue detector AP



Rogue Location Discovery Protocol (RLDP)

If an AP is configured as a rogue detector, its radio is turned off and its role is to listen on the wired network for MAC addresses of clients associated to rogue APs; that is, rogue clients. The rogue detector listens for ARP packets that include rogue client MAC addresses. When it detects one of these ARPs, it reports this to the WLC, providing verification that the rogue AP is attached to the same network as the Cisco Unified Wireless Network. To maximize the likelihood of capturing ARP information, the rogue AP detector is connected to all available broadcast domains using a Switched Port Analyzer (SPAN) port. Multiple rogue AP detector APs can be deployed to capture the various aggregated broadcast domains that exist on a typical network. If a rogue client resides behind a wireless router (a common home WLAN device), its ARP requests are not seen on the wired network, so an alternative to the rogue detector AP method is needed. Additionally, rogue detector APs might not be practical for some deployments because of the large number of broadcast domains to be monitored (such as in the main campus network).

Enterprise Mobility 8.5 Design Guide

4-59

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

WIPS monitoring on 2800, 3800 and 1560 AP

The RLDP option can aid in these situations. In this case, a standard AP, upon detecting a rogue AP, can attempt to associate with the rogue AP as a client and send a test packet to the controller, which requires the AP to stop behaving as a standard AP and temporarily go into client mode. This action confirms that the rogue AP in question is actually on the network, and provides IP address information that indicates its logical location in the network. Given the difficulties in deriving location information in branch offices coupled with the likelihood of a rogue being located in multi-tenant buildings, rogue AP detector and RLDP are useful tools that augment location-based rogue AP detection.

Switch Port Tracing The Cisco Prime Infrastructure provides rogue access point detection by retrieving information from the controller. The rogue access point table is populated with any detected BSSID addresses from any frames that are not present in the neighbor list. A neighbor list contains the known BSSID addresses of validated APs or neighbors. At the end of a specified interval, the contents of the rogue table are sent to the controller in a CAPWAP Rogue AP Report message. With this method, the Cisco Prime Infrastructure simply gathers the information received from controllers. Additionally, you can also incorporate auto or manual switch port tracing (SPT) of wired rogue access point switch ports. The auto SPT is preferable for a large wireless network. Auto SPT launches automatically when a rogue AP is reported to the Cisco Prime Infrastructure. The auto SPT provides a quicker scan based on the wired location association of the rogue AP. The Cisco Prime Infrastructure allows you to configure the criteria for auto SPT and auto containment so that you can run a trace and contain the detected rogue access points on the wire. When the multiple controllers report that a rogue AP should be auto contained, the Cisco Prime Infrastructure finds the controller that reports the strongest RSSI and sends the containment request to the controller.

Rogue AP Containment Rogue AP connected clients, or rogue ad-hoc connected clients, can be contained by sending 802.11 de-authentication packets from nearby APs. This should be done only after steps have been taken to ensure that the AP is truly a rogue AP, because it is illegal to do this to a legitimate AP in a neighboring WLAN. This is why the automatic rogue AP containment feature is removed from the solution. To determine whether rogue AP clients are also clients on the enterprise WLAN, the client MAC address can be compared with MAC addresses collected by the AAA during 802.1X authentication. This allows for the identification of potential WLAN clients that might have been compromised or users who are not following security policies.

Management Frame Protection One of the challenges in 802.11 has been that management frames are sent in the clear with no encryption or message integrity checking and are therefore vulnerable to spoofing attacks. WLAN management frame spoofing can be used to attack a WLAN network. To address this, we created a digital signature mechanism to insert a message integrity check (MIC) into 802.11 management frames. This allows legitimate members of a WLAN deployment to be identified, as well as being able to identify rogue infrastructure devices, and spoofed frames through their lack of valid MICs. The MIC used in management frame protection (MFP) is not a simple CRC hashing of the message, but also includes a digital signature component. The MIC component of MFP ensures that a frame has not been tampered with, and the digital signature component ensures that the MIC could have only been produced by a valid member of the WLAN domain. The digital signature key used in MFP is shared

Enterprise Mobility 8.5 Design Guide

4-60

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features WIPS monitoring on 2800, 3800 and 1560 AP

among all controllers in a mobility group; different mobility groups have different keys allowing validation of all WLAN management frames processed, by the WLCs, in that mobility group (Figure 4-29). Figure 4-29

Management Frame Protection

Both infrastructure-side and client MFP are currently possible, but client MFP requires Cisco Compatible Extensions v5 WLAN clients to learn the mobility group MFP key before they can detect and reject invalid frames. MFP provides the following benefits: •

Authenticates 802.11 management frames generated by the WLAN network infrastructure.



Allows detection of malicious rogues that spoof a valid AP MAC or SSID to avoid detection as a rogue AP, or as part of a man-in-the-middle attack.



Increases the effectiveness of the rogue AP and WLAN IDS signature detection of the solution.



Provides protection of client devices using Cisco Compatible Extensions v5.



Supported by standalone AP.

Two steps are required to enable MFP: enabling it under the Security tab on the WLC (Figure 4-30) and enabling it on the WLANs in the mobility group (Figure 4-26).

Enterprise Mobility 8.5 Design Guide

4-61

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco TrustSec SXP

Figure 4-30

Enabling MFP on the Controller

Cisco TrustSec SXP The Cisco TrustSec enables organizations to secure their networks and services through identity-based access control to anyone, anywhere, anytime. The solution also offers data integrity and confidentiality services, policy-based governance, and centralized monitoring, troubleshooting, and reporting services. TrustSec can be combined with personalized, professional service offerings to simplify solution deployment and management, and is a foundational security component to Cisco Borderless Networks. The Cisco TrustSec security architecture builds secure networks by establishing domains of trusted network devices. Each device in the domain is authenticated by its peers. Communication on the links between devices in the domain is secured with a combination of encryption, message integrity check, and data-path replay protection mechanisms. Cisco TrustSec uses the device and user credentials acquired during authentication for classifying the packets by security groups (SGs) as they enter the network. This packet classification is maintained by tagging packets on ingress to the Cisco TrustSec network so that they can be correctly identified to apply security and other policy criteria along the data path. The tag, called the security group tag (SGT), allows the network to enforce the access control policy by enabling the endpoint device to act upon the SGT to filter traffic. Cisco TrustSec security group tag is applied only when you enable AAA override on a WLAN. One of the components of Cisco TrustSec architecture is the security group-based access control. In the security group-based access control component, access policies in the Cisco TrustSec domain are topology-independent, based on the roles (as indicated by security group number) of source and destination devices rather than on network addresses. Individual packets are tagged with the security group number of the source. Enterprise Mobility 8.5 Design Guide

4-62

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco TrustSec SXP

Cisco devices use the SGT Exchange Protocol (SXP) to propagate SGTs across network devices that do not have hardware support for Cisco TrustSec. SXP is the software solution to avoid CTS hardware upgrade on all switches. WLC will be supporting SXP as part of TrustSec Architecture. The SXP sends SGT information to the CTS-enabled switches so that appropriate role-based access control lists (RBACLs) can be activated depending on the role information represented by the SGT. By default, the controller always works in the Speaker mode. To implement the SXP on a network, only the egress distribution switch needs to be CTS-enabled, and all the other switches can be non-CTS-capable switches. The SXP runs between any access layer and distribution switch or between two distribution switches. The SXP uses TCP as the transport layer. CTS authentication is performed for any host (client) joining the network on the access layer switch similar to an access switch with CTS-enabled hardware. The access layer switch is not CTS hardware enabled. Therefore, data traffic is not encrypted or cryptographically authenticated when it passes through the access layer switch. The SXP is used to pass the IP address of the authenticated device, that is a wireless client, and the corresponding SGT up to the distribution switch. If the distribution switch is CTS hardware enabled, the switch inserts the SGT into the packet on behalf of the access layer switch. If the distribution switch is not CTS hardware enabled, the SXP on the distribution switch passes the IP-SGT mapping to all the distribution switches that have CTS hardware. On the egress side, the enforcement of the RBACL occurs at the egress L3 interface on the distribution switch. The following are some guidelines for Cisco TrustSec SXP: •

SSXP is supported on the following security policies only: – WPA2-dot1x – WPA-dot1x – 802.1x (Dynamic WEP) – MAC Filtering using RADIUS servers – Web authentication using RADIUS servers for user authentication



SXP is supported for both IPv4 and IPv6 clients.



Controller always operates in the Speaker mode.

For more information, see Cisco TrustSec.

Restrictions for Cisco TrustSec SXP •

SXP is not supported on FlexConnect access points.



SXP is supported only in centrally switched networks that have central authentication.



By default, SXP is supported for APs that work in local mode only.



The configuration of the default password should be consistent for both controller and the switch.



Fault tolerance is not supported because fault tolerance requires local switching on APs.



Static IP-SGT mapping for local authentication of users is not supported.



IP-SGT mapping requires authentication with external ACS servers.



In auto-anchor/guest-anchor mobility the SGT information passed by the RADIUS server to foreign WLC can be communicated to the anchor WLC through the EoIP/CAPWAP mobility tunnel. The anchor WLC can then build the SGT-IP mapping and communicate it to another peer via SXP.

Enterprise Mobility 8.5 Design Guide

4-63

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco TrustSec (CTS) on WLC in rel 8.4

Cisco TrustSec (CTS) on WLC in rel 8.4 The Cisco TrustSec (CTS) architecture provides an end-to-end secure network where each entity is authenticated and trusted by its neighbors and communication links secured that help ensure data confidentiality, authenticity and integrity protection. In addition, CTS facilitates to create a consistent and unified set of policies across network. The following sections describe specific aspects related to CTS infrastructure support on AireOS WLC platforms.

Enterprise Mobility 8.5 Design Guide

4-64

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco TrustSec (CTS) on WLC in rel 8.4

Implementation

Every end point that touches the TrustSec domain gets classified by ISE based on end user identity like role, device-type (other client attributes) and is associated with a unique tag called SGT (Security Group Tag) that is then shared with the device that requested the client authentication upon successful authentication. This allows grouping of clients based on client identity attributes thereby reducing the number of Access Control Entities (ACE) considerably. A major benefit to SGACL use is the consolidation of access ACEs and the operational savings involved with maintenance of those traditional access lists. Trustsec solution is realized across three distinct phases within TrustSec domain. a. Client classification at ingress by a centralized policy database (ISE) and assigning unique

SGT to client based on client identity attributes like role etc. b. Propagation of IP to SGT binding to neighboring devices using SXPv4 and / or inline tagging

methods c. SGACL policy enforcement. AP will be enforcement point for central / local switching (central

authentication

SXPv4 on AP WLC still supports SXPv2 Speaker mode to propagate IP to SGT bindings to neighboring devices, we don’t support SXPv4. AP will support SXPv4 listener and speaker mode.

CTS PAC Provisioning and Device Enrollment Any device that participates in the CTS network requires it to be authenticated and trusted. In order to facilitate the authentication process new devices connected to CTS network under goes an enrollment process where in the device obtains the credentials that is specifically needed for CTS device authentication and obtain general CTS environment information. The WLC device enrollment is initiated by the WLC as part of PAC provisioning with ISE server. The WLC will initiate EAP-FAST and obtains a PAC. This is accomplished by a using the infrastructure of LOCAL-EAP EAP-FAST PAC-provisioning. The PAC obtained uniquely maps to the Device ID. If the Device ID changes, PAC data associated with the previous Device ID is removed from the PAC store. PAC provisioning is triggered when a radius server instance is enabled to provision the PAC. In case of High Availability (HA) setup, PACs will be synced to the standby box.

Enterprise Mobility 8.5 Design Guide

4-65

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco TrustSec (CTS) on WLC in rel 8.4

Environment Data CTS Environment data is a set of information or attributes that helps the device to perform CTS related functions. The device (AirOS WLC) acquires the environment data from the authentication server when the device first joins a Cisco Trust Sec domain by sending a secure radius access-request. The authentication server returns RADIUS Access-Accept with attributes including environment expiry timeout attributes. This is the time interval that controls how often the Cisco Trust Sec device must refresh its environment data.

Inline Tagging Inline tagging functionality is a transport mechanism by which a wireless controller or an access point understand the source SGT (S-SGT). It covers the following two types •

Central switching- For centrally switched packets, WLC performs inline tagging for all packets sourced from wireless clients that reside on the WLC by tagging it with Cisco Meta Data (CMD) tag. For packets inbound from the DS, inline tagging also involves WLC will strip the packet of the header and send it to the AP over CAPWAP for the AP to learn the S-SGT tag. SGACL enforcement will happen at the AP.



Local switching- For transmitting ,locally switched traffic AP performs inline tagging for packets sourced from clients that reside on the AP. When receiving traffic, AP will handle both locally switched and centrally switched packets and use S-SGT tag for packets and apply the SGACL policy.

With wireless TrustSec enabled on WLC the choice of also enabling and configuring SXP to exchange tags with the switches is optional and both modes i.e. SXP speaker mode and inline tagging are supported; however there is no use case to have both SXP and wireless TrustSec on AP to be enabled simultaneously.

Work Flow Before a WLC can start downloading SGACL policies from ISE it must initiate PAC (Protected Access Credential) provisioning over a EAP-FAST TLS tunnel. This will be used to download SGACL as required based on authenticated client SGT tag. Currently ISE supports SGACL policy download for given destination SGT (D-SGT) from all known source SGT (S-SGT). When a wireless client is authenticated by ISE, WLC receives a SGT associated with the client. WLC will treat client SGT as D-SGT and initiate download of SGACL policy names for the destination from ISE. The policy names returned will be all possible / known S-SGTs paired with the specific client D-SGT. These policies associated with the D-SGT are cached on WLC and pushed to the AP associated with the client.

Enterprise Mobility 8.5 Design Guide

4-66

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Cisco TrustSec (CTS) on WLC in rel 8.4

Client classification happens at ingress by centralized policy database (ISE) that assigns a unique S-SGT to client based on client identity as per policy rules. SGACL download and policy is enforced (associated with the D-SGT) on the egress side. 1.

SGACL enforcement for local and central switched traffic happens on AP and not on WLC.

2.

In a flex mode AP doing local authentication, enforcement point will be the AP.

Enterprise Mobility 8.5 Design Guide

4-67

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Cisco TrustSec (CTS) on WLC in rel 8.4

Wireless TrustSec Support on WLC 8.4 Table 4-2

Feature

Platform

Inline SGT tagging and SG-ACL enforcement

APs 17xx, 27xx,37xx, 18xx, 28xx and 38xx WLCs 3504, 5520 and 8540

SXPv2

APs 17xx, 27xx,37xx, 18xx, 28xx and 38xx WLCs 3504, 5520 and 8540

SXPv4

APs 17xx, 27xx,37xx, 18xx, 28xx, 38xx, WLCs 3504, 5520 and 8540

Figure 4-31

Management System Security Features Apart from providing location support for Rogue AP detection, the management system Cisco Prime provides two additional Unified Wireless Network security features: WLC configuration verification management and an alarm and reporting interface.

Configuration Verification The management system Cisco Prime can provide on-demand or regularly-scheduled configuration audit reports, which compare the complete current running configuration of a WLC and its registered access points with that of a known valid configuration stored in the management system Cisco Prime databases. Any exceptions between the current running configuration and the stored database configuration are noted and brought to the attention of the network administrator via screen reports (Figure 4-31).

Alarms and Reports Apart from the alarms that can be generated directly from a WLC and sent to an enterprise network management system Cisco Prime, where the management system can also send alarm notifications. The primary difference between alarm notification methods, apart from the type of alarm sent by the various components, is that the WLC uses Simple Network Management Protocol (SNMP) traps to send alarms (which can be interpreted only by an NMS system), whereas the management system Cisco Prime uses SMTP e-mail to send an alarm message to an administrator. The management system Cisco Prime provides both real-time and scheduled reports, and can export or e-mail reports. The management system Cisco Prime provides reports on: •

Access points



Audits

Enterprise Mobility 8.5 Design Guide

4-68

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features Password Policies



Clients



Inventory



Mesh



Performance



Security

Password Policies The password policies allows administrator to enforce strong password checks on newly created passwords for additional management users of controller and access point. The following are the requirements enforced on the new password: •

When the controller is upgraded from old version, all the old passwords are maintained as it is, even though the passwords are weak. After the system upgrade, if strong password checks are enabled, the same is enforced from that time and the strength of previously added passwords will not be checked or altered.



Depending on the settings done in the Password Policy page, the local management, access point, management use and SNM3 user configuration is affected.

Figure 4-32 illustrates the password policies for Local Management User, AP, Management User and SNMPv3 user.

Enterprise Mobility 8.5 Design Guide

4-69

Chapter 4

Cisco Unified Wireless Network Architecture—Base Security Features

Password Policies

Figure 4-32

Password Policies - Local Management User and AP

Enterprise Mobility 8.5 Design Guide

4-70

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.